- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- Mobile Ad Hoc Networks
- Cryptographic Implementations and Security
- Network Security and Intrusion Detection
- Chaos-based Image/Signal Encryption
- Security in Wireless Sensor Networks
- Wireless Body Area Networks
- Energy Efficient Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Wireless Networks and Protocols
- Physical Unclonable Functions (PUFs) and Hardware Security
- IoT and Edge/Fog Computing
- Bluetooth and Wireless Communication Technologies
- IPv6, Mobility, Handover, Networks, Security
- Advanced Steganography and Watermarking Techniques
- Privacy, Security, and Data Protection
- Internet Traffic Analysis and Secure E-voting
- Information and Cyber Security
- Blockchain Technology Applications and Security
- Molecular Communication and Nanonetworks
- Advanced Authentication Protocols Security
- Security and Verification in Computing
- Advanced Wireless Network Optimization
- Neuroscience and Neural Engineering
Fordham University
2017-2025
Hashemite University
2010-2020
New York Institute of Technology
2014-2019
New York Institute of Technology
2014-2015
University of Pittsburgh
2008-2009
Jordan University of Science and Technology
2002
Smartphones and smartwatches, which include powerful sensors, provide a readily available platform for implementing deploying mobile motion-based behavioral biometrics. However, the few studies that utilize these commercial devices biometrics are quite limited in terms of sensors physical activities they evaluate. In many such studies, only smartwatch accelerometer is utilized one activity, walking, investigated. this study we consider gyroscope sensor on both smartphone smartwatch,...
There are tremendous security concerns with patient health monitoring sensors in Internet of Things (IoT). The also realized by recent sophisticated and privacy attacks, including data breaching, integrity, collusion. Conventional solutions often offer to patients' during the communication. However, they fail deal complicated attacks at time conversion into cipher after transmission. In this paper, we first study healthcare acquisition then Then, propose a secure collection scheme for...
Bluetooth technology is a key component of wireless communications. It provides low-energy and low-cost solution for short-range radio transmissions. Bluetooth, more specifically Low Energy (BLE) has become the predominant connecting IoT (Internet Things). can be found in cell phones, headsets, speakers, printers, keyboards, automobiles, children’s toys, medical devices, as well many other devices. The also automated smart homes, to provide monitors controls lights, thermostats, door locks,...
In healthcare, the Internet of Things (IoT) offers many benefits, including being able to monitor patients more closely and using data for analytics. When it comes IoT medical device integration, focus is shifted towards consumer end, such as glucose meters, blood pressure cuffs, other devices designed record on patient vital signs. This enables healthcare providers automatically collect information apply decision support rules allow earlier intervention in treatment process. Unfortunately,...
Penetration testing helps to secure networks, and highlights the security issues. In this paper investigate different aspects of penetration including tools, attack methodologies, defense strategies. More specifically, we performed tests using a private devices, virtualized systems tools. We predominately used tools within Kali Linux suite. The attacks included: smartphone testing, hacking phones Bluetooth, traffic sniffing, WPA Protected Wifi, Man-in-the-Middle attack, spying (accessing PC...
Internet of Things (IoT) devices and the edge jointly broaden IoT's sensing capability monitoring scope for various applications. Though accessing data making decisions through IoT smart turns out to be commonplace, it is challenging guarantee user privacy preserve accuracy (integrity) collected data. The frequently lose either user's or integrity. This also makes crucial put a threshold on cost computation load devices, as gradually more services demand access resources that offer. In this...
With extraordinary growth in the Internet of Things (IoT), amount data exchanged between IoT devices is growing at an unprecedented scale. Most are low-resource handling sensitive and confidential data. Conventional encryption methods inappropriate for lowresource devices. Lightweight block ciphers used to encrypt on such devices, as it balances security requirements energy consumption. The objective this paper explore opportunities improve performance optimize consumption cipher designs...
Security of IoT devices is getting a lot attention from researchers as they are becoming prevalent everywhere. However, implementation hardware security in these has been overlooked, and many researches have mainly focused on software, network, cloud security. A deeper understanding Trojans (HTs) protection against them utmost importance right now the prime threat to hardware. This paper emphasizes need for secure hardware-level foundation devices, depending software alone not adequate...
Optimizing digital twins in the Industrial Internet of Things (IIoT) requires secure and adaptable AI models. The IIoT enables twins, virtual replicas physical assets, to improve real-time decision-making, but challenges remain trust, data security, model accuracy. This paper presents a novel framework combining blockchain technology federated learning (FL) address these issues. By deploying models on edge devices using FL, privacy is maintained while enabling collaboration across industrial...
There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and it has potential to save billions of dollars. Among major concerns are preventing patients from widely adopting this technology data privacy security. Wireless Medical Sensor Networks (MSNs) building blocks for systems. This paper helps identify most challenging security issues existing authentication protocols patient presents a lightweight public-key-based protocol MSNs. In...
In this article, an industrial cyber-physical system (ICPS) is utilized for monitoring critical events such as structural equipment conditions in environments. Such a can easily be point of attraction the cyberattackers, addition to faults, severe resource constraints (e.g., bandwidth and energy), environmental problems. This makes data collection ICPS untrustworthy, even are altered after forwarding. Without validating before aggregation, detection event through aggregation difficult....
Crypto-ransomware is a challenging threat that ciphers user's files while hiding the decryption key until ransom paid by victim. This type of malware lucrative business for cybercriminals, generating millions dollars annually. The spread ransomware increasing as traditional detection-based protection, such antivirus and anti-malware, has proven ineffective at preventing attacks. Additionally, this form incorporating advanced encryption algorithms expanding number file types it targets....
The presence of wireless communication grows undeniably more prevalent each year. Since the introduction IEEE 802.11 standard for Wireless Local Area Networks (WLAN) in 1997, technologies have progressed to provide accessibility industries and consumers with growing ease convenience. As usage personal devices, such as phones watches, that connect Internet through Wi-Fi increases, attacks on users are becoming critical. This paper provides a novel attack model offer an organized comprehensive...
Abstract The growth of low‐resource devices has increased rapidly in recent years. Communication such presents two challenges: security and resource limitation. Lightweight ciphers, as HIGHT cipher, are encryption algorithms targeted for low systems. Designing lightweight ciphers reconfigurable platform ( e . g ., field‐programmable gate array) provides speedup well flexibility. cipher consists simple operations adequate level. objective this research work is to design, optimize, model FPGA...
The current state of the internet relies heavily on SSL/TLS and certificate authority model. This model has systematic problems, both in its design as well implementation. There are problems with revocation, governance, breaches, poor security practices, single points failure root stores. paper begins a general introduction to description role certificates, authorities stores will then explore describe work being done help mitigate these problems.
This study highlights the issues relevant to current cyber attacks on social networks, challenges, and possible ways thwart criminals from accessing networks causing damage. Finally, it presents important recommendations for preventing network better understanding of field.
As Bluetooth technology has evolved and improved over the years, it gained widespread acceptance is increasingly found in many aspects of everyday life. It's convenient easy to use, but also security flaws which make vulnerable attacks. In this paper, we discuss demonstrate some tools techniques that are currently available attackers exploit vulnerabilities Bluetooth. We mitigate those risks protect data devices. Yet despite its world-wide continued proliferation, as have learned through our...